Trustwave Blog

Video:

What Does a Fileless Malware Attack Look Like?

Cybercriminals are hastening their use of methods and malware that are intended to evade detection. In the video above, Trustwave Incident Response Consultant James Antonakos recounts his involvement in real-life breach investigations to describe how resource-deprived organizations can get started on addressing insidious, but subtle, attacks like fileless malware. One of their options, James explains, is through proactive threat hunting.